IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
1 - 25 of 1561 Matches Previous Page  |  Next Page
Three Ways to Leverage Desktop Virtualization To Reduce the Complexity in Securing Endpoints
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore three ways that desktop virtualization can reduce the time and complexity involved in securing endpoints – while also limiting your risk of data loss from security breaches.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Dell, Inc. and Intel®

Top 10 reasons to strengthen information security with desktop virtualisation
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how desktop virtualization overcomes information security challenges in today's enterprises. You'll discover how desktop virtualization compares to traditional security models and the top 10 benefits of using desktop virtualization to strengthen information security.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Defend Your Backend Mobile Web Properties
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn how to extend coverage to your organization's mobile devices on the front end of mobile micro apps, while protecting the network and backend components of your web solutions.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.
Posted: 28 Jul 2015 | Published: 31 Jan 2015

Citrix

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

Cyber Risk Report: Wide Range of Financials Targets Continue to Get Hit
sponsored by SurfWatch Labs
WHITE PAPER: This report uses data from recent financial sector attacks to discuss trends in financial sector security.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Implementing an Intelligent Security Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll learn about Cisco's intelligent security architecture that spans endpoints, networks, security analytics, malware protection, and threat intelligence. Read on and discover how you can benefit from a more intelligent security system.
Posted: 20 Jul 2015 | Published: 27 Feb 2015

Cisco Systems, Inc.

Building Application Centric, Security-Enabled Data Centers
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to discover the Cisco solution that delivers application centric security automation in existing and next-generation data centers.
Posted: 20 Jul 2015 | Published: 29 Nov 2013

Cisco Systems, Inc.

Securing Your Customers Online
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses how you can easily add a second level of authentication to your web applications without inconveniencing your users.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Securing your Enterprise in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the issue of cloud security and discusses how you can invest in the cloud without putting your business at risk.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Intelligence-Led Security: Develop a Concrete Plan
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper discusses the importance of proactive, intelligence-based security and gives suggestions for implementing it in your business.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

10 Steps for Protecting Executives Using Cyber Threat Intelligence
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper analyzes how social engineering and other technologies can help criminals to target your business's executives and assets, and it suggests ten ways you can protect them.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Connecting the Dots: How Threat Intelligence Uses its Data
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper demonstrates how truly effective threat intelligence systems work by presenting a case study where a threat intelligence system was used to uncover the source of an attack.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

Authentication for Today's Threat Landscape
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the capabilities of an authentication system that would be effective in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Dec 2011

Symantec Corporation
1 - 25 of 1561 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement